A survey on gait recognition
C Wan, L Wang, VV Phoha - ACM Computing Surveys (CSUR), 2018 - dl.acm.org
Recognizing people by their gait has become more and more popular nowadays due to the
following reasons. First, gait recognition can work well remotely. Second, gait recognition …
following reasons. First, gait recognition can work well remotely. Second, gait recognition …
A survey on brain biometrics
Brainwaves, which reflect brain electrical activity and have been studied for a long time in
the domain of cognitive neuroscience, have recently been proposed as a promising …
the domain of cognitive neuroscience, have recently been proposed as a promising …
Sok: Authentication in augmented and virtual reality
S Stephenson, B Pal, S Fan… - … IEEE Symposium on …, 2022 - ieeexplore.ieee.org
Augmented reality (AR) and virtual reality (VR) devices are emerging as prominent
contenders to today's personal computers. As personal devices, users will use AR and VR to …
contenders to today's personal computers. As personal devices, users will use AR and VR to …
Behavioural biometrics in VR: Identifying people from body motion and relations in virtual reality
Every person is unique, with individual behavioural characteristics: how one moves,
coordinates, and uses their body. In this paper we investigate body motion as behavioural …
coordinates, and uses their body. In this paper we investigate body motion as behavioural …
EarEcho: Using ear canal echo for wearable authentication
Smart wearable devices have recently become one of the major technological trends and
been widely adopted by the general public. Wireless earphones, in particular, have seen a …
been widely adopted by the general public. Wireless earphones, in particular, have seen a …
A review on protection and cancelable techniques in biometric systems
JC Bernal-Romero, JM Ramirez-Cortes… - Ieee …, 2023 - ieeexplore.ieee.org
An essential part of cloud computing, IoT, and in general the broad field of digital systems, is
constituted by the mechanisms which provide access to a number of services or …
constituted by the mechanisms which provide access to a number of services or …
PPGPass: Nonintrusive and secure mobile two-factor authentication via wearables
Mobile devices are promising to apply two-factor authentication in order to improve system
security and enhance user privacy-preserving. Existing solutions usually have certain limits …
security and enhance user privacy-preserving. Existing solutions usually have certain limits …
[PDF][PDF] OcuLock: Exploring human visual system for authentication in virtual reality head-mounted display
The increasing popularity of virtual reality (VR) in a wide spectrum of applications has
generated sensitive personal data such as medical records and credit card information …
generated sensitive personal data such as medical records and credit card information …
Velody: Nonlinear vibration challenge-response for resilient user authentication
Biometrics have been widely adopted for enhancing user authentication, benefiting usability
by exploiting pervasive and collectible unique characteristics from physiological or …
by exploiting pervasive and collectible unique characteristics from physiological or …
Blinkey: A two-factor user authentication method for virtual reality devices
Virtual Reality (VR) has shown promising potentials in many applications, such as e-
business, healthcare, and social networking. Rich information regarding user's activities and …
business, healthcare, and social networking. Rich information regarding user's activities and …